DocumentCode
479255
Title
Research on Key Technologies of Network Security Management Policy
Author
Tang, Chenghua ; Yu, Shunzheng
Author_Institution
Dept. of Electr. & Commun. Eng., Sun Yat-Sen Univ., Guangzhou
fYear
2008
fDate
12-14 Oct. 2008
Firstpage
1
Lastpage
4
Abstract
For purpose of managing network security policy duly and flexibly in the complex network environment, and resolving its issue efficiency, this paper proposes network security policy self-adaptive management and distribution model. An incident triggered, policy-driven and self-adaptive management mechanism is established, and the impact of safety equipment or user requests, such as system resources found on the flow control can be calculated automatically. The distribution model is given to response policy request rapidly, take the appropriate policy dissemination methods, and reduce PDP computing tasks, system resource consumption, as well as between the PDP and PEP data transmission volume, which introduces the concepts of issue affecting factors, security domain addresses allocation, etc. The effectiveness of the proposed model and algorithms is proved by experiments.
Keywords
computer networks; telecommunication network management; telecommunication security; distribution model; network security management policy; self-adaptive management; Automatic control; Complex networks; Control systems; Data communication; Data security; Distributed computing; Environmental management; Resource management; Safety devices; Technology management;
fLanguage
English
Publisher
ieee
Conference_Titel
Wireless Communications, Networking and Mobile Computing, 2008. WiCOM '08. 4th International Conference on
Conference_Location
Dalian
Print_ISBN
978-1-4244-2107-7
Electronic_ISBN
978-1-4244-2108-4
Type
conf
DOI
10.1109/WiCom.2008.2919
Filename
4681108
Link To Document